Cryptanalysis of the Vesta-2M stream cipher

The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O. The author point out the mistake of attack introduced by the paper [1], and introduce a known plaintext attack method...

Full description

Saved in:
Bibliographic Details
Main Author: GUAN Jie
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2003-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74360861/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841538960526934016
author GUAN Jie
author_facet GUAN Jie
author_sort GUAN Jie
collection DOAJ
description The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O. The author point out the mistake of attack introduced by the paper [1], and introduce a known plaintext attack method where only a small segment of known plaintext(about hundreds of bits) , the upper bound of the compute complexity is)2(372O.
format Article
id doaj-art-38f60c83b42b449ca0332457b6e28bda
institution Kabale University
issn 1000-436X
language zho
publishDate 2003-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-38f60c83b42b449ca0332457b6e28bda2025-01-14T07:29:44ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2003-01-0115015474360861Cryptanalysis of the Vesta-2M stream cipherGUAN JieThe security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O. The author point out the mistake of attack introduced by the paper [1], and introduce a known plaintext attack method where only a small segment of known plaintext(about hundreds of bits) , the upper bound of the compute complexity is)2(372O.http://www.joconline.com.cn/zh/article/74360861/Vesta-2Mstream ciphercryptanalysis
spellingShingle GUAN Jie
Cryptanalysis of the Vesta-2M stream cipher
Tongxin xuebao
Vesta-2M
stream cipher
cryptanalysis
title Cryptanalysis of the Vesta-2M stream cipher
title_full Cryptanalysis of the Vesta-2M stream cipher
title_fullStr Cryptanalysis of the Vesta-2M stream cipher
title_full_unstemmed Cryptanalysis of the Vesta-2M stream cipher
title_short Cryptanalysis of the Vesta-2M stream cipher
title_sort cryptanalysis of the vesta 2m stream cipher
topic Vesta-2M
stream cipher
cryptanalysis
url http://www.joconline.com.cn/zh/article/74360861/
work_keys_str_mv AT guanjie cryptanalysisofthevesta2mstreamcipher